Where does identification Occur:
can happen anywhere in env, helpful zones for gathering events are to analyze for evidence of attacks are:
1. NW perimeter detect:
occurs on nw,FW, routers, external facing nw based IDS, IPS,DMZ systems,etc. These systems can give us earlier warnings about an attacks as they monitor our borders with internet & other external nws
2. Host perimeter detect:
Occurs when data enters or leaves a host
personal fw/ips,localforewalls,port sentry tools
3. System-level (host) detect:
Occurs based on activity on the host itself
antivirus tools,endpoint sec suites, file integrity tools,user noticing strange behavior
4. App-level detect: app logs webapp,appser,cloudservice etc